The Daily Parker

Politics, Weather, Photography, and the Dog

What could possibly go wrong?

In an effort to avoid liability for some things, Uber has decided to enter an entirely new area of potential liability:

Uber is rolling out a new safety feature Wednesday in Chicago and other markets that will allow drivers and riders to record audio during the trip to deter and resolve conflicts.

Once enabled, the safety feature will pop up on the app, giving both the driver and rider an option to hit the record button for all or part of the journey. The completed audio file is encrypted and stored on the user’s smartphone for seven days in the event that either party wants to submit an incident report to Uber.

The rollout was slated to go live in Chicago and remaining U.S. markets in phases beginning Wednesday. Uber users will get an email over the coming days to let them know the recording feature is available. Enabled through the app, riders and drivers will be able to activate the audio recording feature at any time during the trip. The recording will end automatically after the drive is completed.

To assuage privacy concerns, the audio files are encrypted, meaning neither the driver nor the rider can listen to them on their devices. The recording can be decrypted if a rider or driver submits the file as part of a safety report to Uber. As in “Mission: Impossible,” the audio file will self-destruct after seven days if no action is taken.

Whoo boy. Cue the subpoenas for completely unrelated lawsuits, both criminal and civil. And only seven days? That seems way too short to me, and will probably seem way too short to a court.

Plus, as the article reminds us, Illinois is a "two-party" state, meaning both parties to a conversation must consent to a recording of it—sometimes. It's a crime to "surreptitious[ly]" record someone without their consent, but not a crime to do it openly. Sometimes.

I understand why Uber wants to do this. But I also have opinions about Uber's lack of transparency and lack of commitment to adequate cyber security measures in the past. This will be interesting.

Comments are closed